US8775801B2 - Radio communication apparatus and radio communication method - Google Patents
Radio communication apparatus and radio communication method Download PDFInfo
- Publication number
- US8775801B2 US8775801B2 US12/726,494 US72649410A US8775801B2 US 8775801 B2 US8775801 B2 US 8775801B2 US 72649410 A US72649410 A US 72649410A US 8775801 B2 US8775801 B2 US 8775801B2
- Authority
- US
- United States
- Prior art keywords
- authentication
- security level
- unit
- user
- discriminating
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related, expires
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
Definitions
- the present invention relates to a radio communication apparatus executing radio communications accompanying authentication procedure of, for example, Bluetooth®, etc.
- SSP Secure Simple Pairing
- the SSP has two objects. One of the objects is to improve usability by simplifying the authentication procedure. The other object is to improve security by introducing a public key encryption system and reinforcing resistance to passive eavesdropping and man-in-the-middle or active eavesdropping.
- a shape of Device A enables the device to display numbers and to input numbers and Yes/No.
- Device B has any shape (the authentication processing is classified according to the shape of Device B).
- the conventional authentication procedure (Bluetooth Core Specification version 2.0+EDR) has urged a user to input, for example, a common decimal four-digit PIN number to each of Device A and Device B, in order to prevent active eaves dropping by checking whether both the numbers match, and concealed a link key by creating a link key from the PIN numbers input by the user, in order to prevent passive eavesdropping.
- Bluetooth Core Specification version 2.0+EDR Bluetooth Core Specification version 2.0+EDR
- the user can maintain the security level by describing the PIN number preliminarily in a manual, etc. of Device B and inputting the PIN number in Device A.
- SSP Bluetooth core Specification version 2.1+EDR, Version 2.1 or later
- the resistance to passive eavesdropping is improved and the security performance is enhanced by applying the public key encryption system to the link key creation to solve the above problem.
- One aspect of the present invention is a radio communication apparatus for executing communication by establishing a communication link according to a security level with other device, the apparatus comprising: a setting unit configured to set a security level according to a type of service; a discriminating unit configured to discriminate whether the security level set by the setting unit is necessary for the communication with the other device, in accordance with the type of the other device; a first link establishing unit configured to establish the communication link according to the security level set by the setting unit, with the other device, if the discriminating unit discriminates that the security level is necessary; and a second link establishing unit configured to lower the security level set by the setting unit and to establish the communication link according to the security level with the other device, if the discriminating unit discriminates that the security level is unnecessary.
- Another aspect of the present invention is a radio communication apparatus for executing communication by establishing a communication link according to a security level with other device, the apparatus comprising: an authenticating unit configured to execute authentication according to the security level set by the other device; a discriminating unit configured to discriminate whether user authentication is necessary or not, in accordance with a type of the other device, if the authentication executed by the authenticating unit is not authentication including confirmation executed by the user; and a link establishing unit configured to establish the communication link with the other device if the discriminating unit discriminates that the user authentication is unnecessary, and accept a direction to permit connection with the other device from the user and to establish the communication link with the other device if the discriminating unit discriminates that the user authentication is necessary.
- the other aspect of the present invention is a radio communication apparatus comprising: a near field communication unit configured to execute near field communication; and an authentication discriminating unit configured, upon receiving a request for establishment of connection using the near field communication unit from other device, to discriminate whether the other device is capable of executing an authentication procedure satisfying a security level requested by the apparatus or not, and whether the other device has been authenticated by the apparatus, and to reject a connection request from the other device if the other device is incapable of executing an authentication procedure satisfying a security level requested by the apparatus and if the other device has been unauthenticated by the apparatus.
- FIG. 1 is a block diagram showing a configuration of a radio communication apparatus according to an embodiment A of the present invention
- FIG. 2 is a block diagram showing a configuration concerning control of Bluetooth communications in the radio communication apparatus shown in FIG. 1 ;
- FIG. 3 is a flowchart showing the control of Bluetooth communications in the radio communication apparatus shown in FIG. 1 ;
- FIG. 4 is an illustration showing an inquiry sequence to a corresponding device of the radio communication apparatus shown in FIG. 1 ;
- FIG. 5 is an illustration showing a structure of FHS packet
- FIG. 6 is an illustration showing a structure of EIR packet
- FIG. 7 is a block diagram showing a configuration of a radio communication apparatus according to an embodiment B of the present invention.
- FIG. 8 is a block diagram showing a configuration concerning control of Bluetooth communications in the radio communication apparatus shown in FIG. 7 ;
- FIG. 9 is a flowchart showing the control of Bluetooth communications in the radio communication apparatus shown in FIG. 7 ;
- FIG. 10 is a block diagram showing a configuration of a cellular telephone according to an embodiment C of the present invention.
- FIG. 11 is a flowchart showing processing in a case where the cellular telephone according to an embodiment C of the present invention accepts a connection request;
- FIG. 12 is a flowchart showing processing in a case where the cellular telephone according to an embodiment C of the present invention accepts a connection request;
- FIG. 13 is a flowchart showing processing in a case where the cellular telephone according to an embodiment C of the present invention makes a connection request
- FIG. 14 is an illustration showing an example of a screen to be displayed on a screen in a case where the cellular telephone according to an embodiment C of the present invention makes a connection request.
- a cellular telephone comprising a Bluetooth® communication function will be exemplified as a radio communication apparatus of the present invention.
- the cellular telephone performs authentication by using SSP.
- authentication system A that can prevent both the passive eavesdropping and active eavesdropping
- authentication system B that can prevent passive eavesdropping alone but cannot prevent active eavesdropping. Selection of the system is performed by authenticating Device B at Device A according to I/O capability of Device B preliminarily notified prior to the authentication procedure.
- Active eavesdropping is that a malicious person between Device A and Device B urges Device A and Device B to discriminate success in authentication by acting as Device B for Device A and acting as Device A for Device B, to eavesdrop and falsify the communication data.
- One of the examples of authentication system A is Numeric Comparison (Bluetooth Core Specification version 2.1+EDR).
- the active eavesdropping is prevented by making the user recognize that the connected device is an intended device by a simple operation. More specifically, in both the devices, six-digit numbers are created in a determined arithmetic operation from public Keys (Public Key A, Public Key B) of both the devices during the authentication procedure. The user visually recognizes that the same number is displayed on both the devices, and pushes down Yes button, to continue the procedure as the success in authentication. If different numbers are displayed on both the devices, the user terminates the procedure as failure in authentication by pushing down No button.
- the intervening person sends own Public key X to Device A (Device B)
- the numbers created from Public key A and Public key X are displayed on Device A while the numbers created from Public key B and Public key X are displayed on Device B, i.e., the created numbers do not match
- the authentication is recognized as NG, and the communication security is thereby maintained.
- the intervening person wiretaps the Public key of Device B (Device A) for Device A (Device B) and transparently sends the wiretapped Public key to Device A (Device B), the same number is displayed on both the devices and the authentication executed by the active eavesdropping succeeds.
- the intervening person does not have the secret key of Device A (Device B)
- the intervening person cannot create a link key or cannot execute wiretapping or falsification by active eavesdropping. In other words, in this case, too, the security of communication is maintained.
- the active eavesdropping is prevented by incorporating the user's confirmation procedure into a part of the authentication procedure.
- Just Works is an example of authentication system B. Just Works is basically the same as the authentication procedure of Numeric Comparison, but has the one difference that there is no user's confirmation procedure.
- Device A (Device B) automatically obtains the number created by the other device and executes comparison, and the authentication procedure is thereby continued.
- the resistance to active eavesdropping in Just Works is equal to that in Numeric Comparison since the public key encryption system is applied. However, the numeric comparison is automatically executed, Just Works does not have the resistance to active eavesdropping.
- authentication system B since authentication system B does not require user's confirmation procedure, there is no burden on the user operation and authentication system B is superior to authentication system A in terms of the usability.
- the confirmation procedure is necessary and there is much burden on the user operation in authentication system A, but authentication system A has high security performance since active eavesdropping can be prevented in the system.
- One of the authenticate systems can be selected in accordance with the I/O ability of the device.
- the I/O ability of Device B if Device B has a shape such as a head set which does not comprise an input interface or an output interface, Device B does not comprise means for confirming the connection with a device intended by the user (for example, displaying numbers, etc.) Therefore, as long as authentication system A is based on the user confirmation, authentication system A having the resistance to active eavesdropping cannot be selected and active eavesdropping cannot be prevented by applying the system such as authentication system B, in such a case.
- Device B In this selecting method, if Device B has the I/O ability by which the user confirmation cannot be executed, Device B cannot help selecting the authentication system of a low security level irrespective of the security level of the communications.
- Another method for deciding the authentication is to accept the authentication system B irrespective of the security level of the communications.
- authentication system B since the user confirmation is not executed in authentication system B, authentication system B has no resistance to active eavesdropping and a low security performance. For this reason, a problem of security occurs in the communications required to be executed at a high security level.
- Another method for deciding the authentication is to prevent a risk of connecting to an intended intervening person by rejecting the authentication request from Device B which does not comprise an input interface or an output interface.
- this method only the authentication system A is executed, therefore the high security level is maintained.
- connectivity between the devices is lowered. For example, if Device B is a headset which does not comprise a display or Yes/No button, Device B is mainly used for listening to music, and does not need to reject the connection even if the authentication cannot be executed at a high security level.
- the cellular telephone executes authentication according to the security level.
- the security level is set in accordance with the type of the service executed between the devices, and the type of the other device.
- the cellular telephone in this embodiment can enhance connectivity while assuring a necessary security level when the cellular telephone executes authentication by using SSP.
- FIG. 1 is a block diagram showing a configuration of cellular telephone UE according to the embodiment.
- the cellular telephone UE comprises as main constituent elements thereof a control unit 100 , a first radio communication unit 10 , a second radio communication unit 20 , a conversation unit 30 , an operation unit 40 , a storage unit 50 and a display unit 60 , and also comprises a communication function of a cellular telephone and a Bluetooth communication function of a near field communication apparatus.
- the first radio communication unit 10 executes radio communications with a base station apparatus BS accommodated in a mobile communication network NW in, for example, LTE (Long Term Evolution), in accordance with directions of the control unit 100 . Translation and reception of speech data, electronic mail data, etc., and reception of Web data, streaming data, etc. are thereby executed.
- LTE Long Term Evolution
- the second radio communication unit 20 executes radio communications with a Bluetooth-enabled device Dbt in Bluetooth based on Bluetooth Core Specification version 2.1+EDR, in accordance with directions of the control unit 100 . Transmission and reception of various types of data with the Bluetooth-enabled device Dbt are thereby executed.
- the conversation unit 30 comprises a speaker 31 and a microphone 32 , and converts user's speech input through the microphone 32 into speech data which can be processed in the control unit 100 and outputs the speech data to the control unit 100 , and decodes speech data received from the other party of conversation through the first radio communication unit 10 or the second radio communication unit 20 and outputs the decoded speech data from the speaker 31 .
- the operation unit 40 comprises a plurality of key switches, etc., and accepts directions from the user by means of the key switches, etc.
- the storage unit 50 stores control programs and control data of the control unit 100 , application software, address data associated with names, telephone numbers, etc. of the other parties of communication, data of transmitted and received emails, web data downloaded by web browsing, and downloaded content data, and temporarily stores streaming data, etc.
- the storage unit 50 comprises one or more storage means such as HDD, RAM, ROM, IC memory, etc.
- the display unit 60 displays images (still images and moving images), character information, etc. under control of the control unit 100 and visually transmits them to the user.
- the control unit 100 comprises a microprocessor, operates under the control programs and control data stored in the storage unit 50 , and controls all the units of the cellular telephone.
- the control unit 100 also comprises a network communication controlling function for controlling each of the units of the commutation system to execute the speech communication and data communication, a near field communication controlling function for executing communications with the Bluetooth-enabled device Dbt by controlling the operations of the second radio communication unit 20 , and an application processing function for executing mail software which creates, transmits and receives electronic mails, browser software which executes web browsing, media reproduction software which downloads and reproduces streaming data, etc. and for controlling each of the units associated with the software.
- the near field communication controlling function is based on Bluetooth Core Specification version 2.0+EDR and Bluetooth Core Specification version 2.1+EDR.
- the control unit 100 comprises functional blocks as shown in FIG. 8 , and their control allows the second radio communication unit 20 to operate.
- a protocol controlling unit 101 controls the second radio communication unit 20 to execute functions provided by Bluetooth Stack from Baseband to RFCOMM.
- a profile controlling unit 102 controls the second radio communication unit 20 to execute functions provided by various types of Profile such as HFP, A2DP, AVRCP, etc.
- An authentication controlling unit 103 controls the second radio communication unit 20 to execute authentication procedures such as Authentication and Pairing defined under Bluetooth Core Spec such as Bluetooth Stack and Generic Access Profile.
- An authentication discriminating unit 104 controls the second radio communication unit 20 to determine the security level set for each of services (Profile) to be operated and the security level authenticated in accordance with input and output abilities of the Bluetooth-enabled device Dbt, and direct the authentication controlling unit 103 to execute authentication processing.
- Profile services
- a security level setting unit 105 controls the second radio communication unit 20 to manage a security level set for each of services (Profile) and notify the authentication discriminating unit 104 of a security level to be selected, in response to an inquiry from the authentication discriminating unit 104 at the time of the authentication processing.
- Profile services
- a device information discriminating unit 106 controls the second radio communication unit 20 to obtain device information (CoD, Class of Device) of the Bluetooth-enabled device Dbt and discriminate the service (Profile) supported by the Bluetooth-enabled device Dbt.
- a device registration controlling unit 107 controls the second radio communication unit 20 to create a key for authentication of the Bluetooth-enabled device Dbt and hold the key in association with a device address.
- a near field communication controlling unit 108 controls the second radio communication unit 20 to control Baseband of the Bluetooth communications.
- the Bluetooth-enabled device Dbt comprises functional blocks as shown in FIG. 2 at a control unit thereof, and also comprises a radio communication unit for executing Bluetooth communications equivalent to those of the second radio communication unit 20 .
- connection processing is executed by the control unit 100 , and is started when the user requires execution of the application software requiring radio communications with the Bluetooth-enabled device Dbt, by means of the operation unit 40 .
- step 3 a the profile controlling unit 102 controls the second radio communication unit 20 to detect Bluetooth-enabled devices Dbt existing in the vicinity of the cellular telephone UE. Then, the processing proceeds to step 3 b . More specifically, a signals transmitted from the Bluetooth-enabled devices Dbt existing in the vicinity of the cellular telephone UE are received, identification information (BDADDR) included in the signals is extracted, and their existence thereof is detected.
- BDADDR identification information
- step 3 b the control unit 100 displays a list of the Bluetooth-enabled devices Dbt detected in step 3 a , on the display unit 60 , and accepts selection of the other device executing Bluetooth communications by the operation unit 40 . Then, the profile controlling unit 102 controls the second radio communication unit 20 to transmit a calling signal to the selected other device, and the processing proceeds to step 3 c.
- step 3 c the protocol controlling unit 101 controls the second radio communication unit 20 to establish a physical link with the other device, and the processing proceeds to step 3 d.
- step 3 d the authentication controlling unit 103 controls the second radio communication unit 20 to make a request for the other device called in step 3 b as shown in FIG. 4 , over the physical link established in step 3 c , and obtain device information and I/O ability information in accordance with the response from the other device.
- the processing proceeds to step 3 e.
- FIG. 5 shows payload of the FHS packet.
- the FHS packet includes fields called Class of device. This field is further separated into some subfields, and the Class of device is defined by them.
- the subfields indicate a service class, a major device class, and a minor device class.
- service class service categories such as audio, object transmission, network, etc. are defined.
- device class types of devices according to the respective service classes, such as computer, cellular telephone, audio, etc. are further defined. The details are represented in Bluetooth Core Specification version 2.1+EDR.
- step 3 e the authentication discriminating unit 104 makes inquiry of the security level to the security level setting unit 105 , and discriminates the security level notified by the response. If the necessary security level is 3, the processing proceeds to step 3 f . If the necessary security level is 2, the processing proceeds to step 3 i.
- the security level setting unit 105 discriminates that high Security Level 3 is necessary and sets the security level, for a device which uses a service causing billing, a device which uses a service accompanying outgoing calls or a device which uses a service accessing the user information.
- the security level setting unit 105 discriminates that low Security Level 2 is necessary and sets the security level, for a device which uses the other services (listening to music, etc.)
- authentication in the authentication system accompanying the user confirmation is necessary.
- authentication in the authentication system which does not accompany the user confirmation can be executed.
- step 3 f the authentication discriminating unit 104 refers to the I/O ability information obtained in step 3 d by the authentication controlling unit 103 and discriminates whether the other device corresponds to Security Level 3. If the other device corresponds to Security Level 3, the processing proceeds to step 3 g . If the other device does not correspond to Security Level 3, the processing proceeds to step 3 j.
- the authentication discriminating unit 104 discriminates that the other device cannot correspond to Security Level 3. In the other cases, the authentication discriminating unit 104 discriminates that the other device can correspond to Security Level 3.
- step 3 g the authentication discriminating unit 104 gives a direction to the authentication controlling unit 103 .
- the authentication controlling unit 103 thereby creates a link key of Security Level 3 by the SSP and starts the authentication.
- the authentication discriminating unit 104 controls the second radio communication unit 20 to transmit the link key to the other device and receive a link key created similarly at the other device.
- the processing proceeds to step 3 h.
- step 3 h the authentication controlling unit 103 creates a number for the user authentication in, for example, Numeric Comparison.
- the authentication controlling unit 103 reads the public key of the cellular telephone UE stored in the storage unit 50 , and controls the second radio communication unit 20 to transmit the public key to the other device and obtain a public key of the other device from the other device.
- the authentication controlling unit 103 executes a predetermined operation based on both the public keys, creates a number, and displays the created number on the display unit 60 .
- the processing proceeds to step 3 i . At the other device, too, the same processing is executed, and the same number is displayed with the same two public keys.
- step 3 i the authentication controlling unit 103 discriminates whether the user has executed the approved operation by the operation unit 40 or not. The user confirms whether the number displayed on the display unit 60 matches the number displayed on the display unit of the other device or not, and operates the operation unit 40 corresponding to the result of the matching. If the user executes the approved operation, the processing proceeds to step 3 l . If the user executes a disapproved operation or if the user does not execute the approved operation for a predetermined time period or longer, the processing proceeds to step 3 n.
- both the cellular telephone UE and the other device execute the authentication accompanying the user confirmation.
- the authentication discriminating unit 104 refers to the device information obtained in step 3 d by the authentication controlling unit 103 and discriminates whether the other device supports the Bluetooth profile which is going to be activated or not, i.e., whether the other device executes the communication requiring high Security Level 3 or not. If the other device corresponds to the profile (i.e., the other device executes the communication not requiring high Security Level 3), the processing proceeds to step 3 k . If the other device does not correspond to the profile (i.e., the other device executes the communication requiring high Security Level 3), the processing proceeds to step 3 n.
- the authentication discriminating unit 104 confirms whether a category to support A2DP, i.e., “Audio/Video” is included in the major device class included in Class of device received from the other device. If “Audio/Video” is included in the major device class, the authentication discriminating unit 104 discriminates that high Security Level 3 is not necessary since the other device supports A2DP. If “Audio/Video” is not included in the major device class, the authentication discriminating unit 104 discriminates that the communication requiring high Security Level 3 since the other device does not support A2DP.
- A2DP profile to transmit audio data
- step 3 k the authentication discriminating unit 104 gives a direction to the authentication controlling unit 103 , and the authentication controlling unit 103 thereby creates the link key of Security Level 2 by SSP. Then, the authentication discriminating unit 104 controls the second radio communication unit 20 to transmit the created link key to the other device and receive the link key created at the other device. The processing proceeds to step 3 l . Both the cellular telephone UE and the other device execute the authentication.
- step 3 l the authentication discriminating unit 104 discriminates whether the authentication between the cellular telephone UE and the other device has been successful or not. More specifically, the authentication discriminating unit 104 discriminates whether the authentication has been successful or not, by executing collation using the link keys created in step 3 g or step 3 k and confirming that the link keys correspond to each other. If the authentication has been successful, the processing proceeds to step 3 m . If the authentication has been failed, the processing proceeds to step 3 n.
- step 3 m the authentication discriminating unit 104 controls the second radio communication unit 20 to establish a logic link. After this, communication for rendering the service is started between the other device and the second radio communication unit 20 .
- step 3 n the authentication discriminating unit 104 does not establish the logic link since the authentication has been failed.
- the authentication discriminating unit 104 makes display indicating the failure in authentication on the display unit 60 to notify the user of the failure in authentication, and terminates the processing.
- step 3 e In a case where it is discriminated in step 3 e that high Security Level 3 is necessary for the communication with the Bluetooth-enabled device Dbt, if the other device cannot correspond to Security Level 3 but the type of the service implemented at the other device does not require high Security Level 3, the authentication is executed by lowering the security level to 2 and creating the link key.
- the connectivity can be enhanced while maintaining the necessary security level.
- the information items (device information and ability information) of the other device are obtained on the basis of the FHS packet, in step 3 d .
- the information items can be obtained on the basis of, for example, EIR (Extended Inquiry Response) packet.
- the discrimination of the security level setting unit 105 is executed on the basis of these information items, in step 3 e.
- the EIR packet is a packet transmitted from Slave (other device) to Master (cellular telephone UE) after a determined time has elapsed from the FHS packet, and includes information of more detailed service class, etc.
- EIR packet format is shown in FIG. 4 . The details are present in Bluetooth Core Specification version 2.0+EDR.
- the information indicating the type of the service used in step 3 e can be obtained by executing the application selected by means of the operation unit 40 by the user and activating the Profile (service).
- the security level setting unit 105 may discriminate the security level on the basis of types of the action and the service to be activated.
- a cellular telephone comprising a Bluetooth communication function will be exemplified as a radio communication apparatus of the present invention.
- the cellular telephone performs authentication by using SSP.
- the security level may be lowered depending on the I/O capability of the other device.
- the cellular telephone decides authentication system based on the I/O capability of the other device, and the user authentication is executed in the radio communication apparatus in accordance with the type of the other device or the type of the service even if the user authentication is not executed due to the I/O ability of the other device, etc.
- this invention can provide a radio communication apparatus and radio communication method capable of enhancing connectivity while assuring a necessary security level.
- FIG. 7 is a block diagram showing a configuration of cellular telephone UE according to the embodiment of the present invention.
- the cellular telephone UE comprises as main constituent elements thereof a control unit 100 , a first radio communication unit 10 , a second radio communication unit 20 , a conversation unit 30 , an operation unit 40 , a storage unit 50 and a display unit 60 , and also comprises a communication function of a cellular telephone and a Bluetooth communication function of a near field communication apparatus.
- the first radio communication unit 10 executes radio communications with a base station apparatus BS accommodated in a mobile communication network NW in, for example, LTE (Long Term Evolution), in accordance with directions of the control unit 100 . Translation and reception of speech data, electronic mail data, etc., and reception of Web data, streaming data, etc. are thereby executed.
- LTE Long Term Evolution
- the second radio communication unit 20 executes radio communications with a Bluetooth-enabled device Dbt in Bluetooth based on Bluetooth Core Specification version 2.1+EDR, in accordance with directions of the control unit 100 . Transmission and reception of various types of data with the Bluetooth-enabled device Dbt are thereby executed.
- the conversation unit 30 comprises a speaker 31 and a microphone 32 , and converts user's speech input through the microphone 32 into speech data which can be processed in the control unit 100 and outputs the speech data to the control unit 100 , and decodes speech data received from the other party of conversation through the first radio communication unit 10 or the second radio communication unit 20 and outputs the decoded speech data from the speaker 31 .
- the operation unit 40 comprises a plurality of key switches, etc., and accepts directions from the user by means of the key switches, etc.
- the storage unit 50 stores control programs and control data of the control unit 100 , application software, address data associated with names, telephone numbers, etc. of the other parties of communication, data of transmitted and received emails, web data downloaded by web browsing, and downloaded content data, and temporarily stores streaming data, etc.
- the storage unit 50 comprises one or more storage means such as HDD, RAM, ROM, IC memory, etc.
- the display unit 60 displays images (still images and moving images), character information, etc. under control of the control unit 100 and visually transmits them to the user.
- the control unit 100 comprises a microprocessor, operates under the control programs and control data stored in the storage unit 50 , and controls all the units of the cellular telephone.
- the control unit 100 also comprises a network communication controlling function for controlling each of the units of the commutation system to execute the speech communication and data communication, a near field communication controlling function for executing communications with the Bluetooth-enabled device Dbt by controlling the operations of the second radio communication unit 20 , and an application processing function for executing mail software which creates, transmits and receives electronic mails, browser software which executes web browsing, media reproduction software which downloads and reproduces streaming data, etc. and for controlling each of the units associated with the software.
- the near field communication controlling function is based on Bluetooth Core Specification version 2.0+EDR and Bluetooth Core Specification version 2.1+EDR.
- the control unit 100 comprises functional blocks as shown in FIG. 2 , and their control allows the second radio communication unit 20 to operate.
- a protocol controlling unit 101 controls the second radio communication unit 20 to execute functions provided by Bluetooth Stack from Baseband to RFCOMM.
- a profile controlling unit 102 controls the second radio communication unit 20 to execute functions provided by various types of Profile such as HFP, A2DP, AVRCP, etc.
- An authentication controlling unit 103 controls the second radio communication unit 20 to execute authentication procedures such as Authentication and Pairing defined under Bluetooth Core Spec such as Bluetooth Stack and Generic Access Profile.
- a authentication discriminating unit 104 controls the second radio communication unit 20 to determine the security level set for each of services (Profile) to be operated and the security level authenticated in accordance with input and output abilities of the Bluetooth-enabled device Dbt, and direct the authentication controlling unit 103 to execute authentication processing.
- Profile services
- a security level setting unit 105 controls the second radio communication unit 20 to manage a security level set for each of services (Profile) and notify the authentication discriminating unit 104 of a security level to be selected, in response to an inquiry from the authentication discriminating unit 104 at the time of the authentication processing.
- Profile services
- a device information discriminating unit 106 controls the second radio communication unit 20 to obtain device information (CoD, Class of Device) of the Bluetooth-enabled device Dbt and discriminate the service (Profile) supported by the Bluetooth-enabled device Dbt.
- a device registration controlling unit 107 controls the second radio communication unit 20 to create a key for authentication of the Bluetooth-enabled device Dbt and hold the key in association with a device address.
- a near field communication controlling unit 108 controls the second radio communication unit 20 to control Baseband of the Bluetooth communications.
- the Bluetooth-enabled device Dbt comprises functional blocks as shown in FIG. 8 at a control unit thereof, and also comprises a radio communication unit for executing Bluetooth communications equivalent to those of the second radio communication unit 20 .
- connection processing is executed by the control unit 100 , and is started when the second radio communication unit 20 receives a connection request from the Bluetooth-enabled device Dbt.
- the profile controlling unit 102 preliminarily controls the second radio communication unit 20 to detect the Bluetooth-enabled devices Dbt existing in the vicinity of the cellular telephone UE. More specifically, signals transmitted from the Bluetooth-enabled devices Dbt existing in the vicinity of the cellular telephone UE are received, identification information (BDADDR) included in the signals is extracted, and their existence thereof is detected.
- BDADDR identification information
- step 3 a the protocol controlling unit 101 controls the second radio communication unit 20 to establish a physical link with the other device. Then, the processing proceeds to step 3 b.
- step 3 b the authentication controlling unit 103 controls the second radio communication unit 20 to obtain device information and I/O ability information from the other device, as shown in FIG. 4 over the physical link established in step 3 a .
- the processing proceeds to step 3 c.
- the device information and ability information of the I/O device of the cellular telephone UE are also transmitted to the other device to exchange mutual information. These information items are exchanged through FHS packet.
- step 3 c the authentication controlling unit 103 controls the second radio communication unit 20 to execute the processing in predetermined steps, in accordance with the authentication processing executed at the other device. Then, the processing proceeds to step 3 d.
- high Security Level 3 is discriminated necessary and is thus set for a device which uses a service causing billing, a device which uses a service accompanying origination of signals or a device which uses a service accessing the user information, and low Security Level 2 is discriminated necessary and is thus set for a device which uses the other information (listening to music, etc.), on the basis of, for example, the device information (including the types of services) obtained from the cellular telephone UE in step 3 b.
- the authentication processing of the set security level is executed between the other device and the cellular telephone UE. If the authentication succeeds, the other device transmits the information indicating the success in authentication to the cellular telephone UE. If the authentication is failed, the other device transmits the information indicating the failure in authentication to the cellular telephone UE.
- step 3 d the authentication controlling unit 103 controls the second radio communication unit 20 to discriminate whether the authentication processing at the other device has been successful or not, on the basis of the information received from the other device. If the authentication processing has been successful, the security level of the successful authentication is detected and then the processing proceeds to step 3 e . If the authentication processing has been failed, the processing proceeds to step 3 m.
- step 3 e the authentication discriminating unit 104 discriminates whether the successful authentication is at Security Level 3 or not, on the basis of the authentication result executed by the authentication controlling unit 103 in step 3 d . If the successful authentication between the cellular telephone UE and the other device is at Security Level 3, the processing proceeds to step 3 i . If the authentication is at Security Level 3, the processing proceeds to step 3 f.
- step 3 f the authentication discriminating unit 104 , considering the device information obtained by the authentication controlling unit 103 in step 3 b and the service (profile) to be executed, discriminates whether user approval is necessary or not, by confirming whether the other device corresponds to the profile to be activated or not. If the user approval is necessary, the processing proceeds to step 3 g . If the user approval is not necessary, the processing proceeds to step 3 i.
- the authentication discriminating unit 104 confirms whether a category to support A2DP, i.e., “Audio/Video” is included in the major device class of Class of device received from the other device or not. If “Audio/Video” is included in the major device class, the authentication discriminating unit 104 discriminates that the user approval is unnecessary since the other device corresponds to A2DP to be activated. If “Audio/Video” is not included in the major device class, the authentication discriminating unit 104 discriminates that the user approval is necessary since the other device does not correspond to A2DP.
- A2DP profile to transmit audio data
- step 3 g the authentication controlling unit 103 makes an inquiry to the user on the display unit 60 , makes display to inquire whether the user intends to connect to the other device or not, and accepts the input by means of the operation unit 40 .
- the processing proceeds to step 3 h.
- step 3 h the authentication controlling unit 103 discriminates whether the user has executed an operation of approving the connection in step 3 g or not. If the user has approved the connection, the processing proceeds to step 3 i . If the user has not approved the connection, the processing proceeds to step 3 j.
- step 3 i the authentication discriminating unit 104 controls the second radio communication unit 20 to establish a logic link. After this, communication for rendering the service is started between the other device and the second radio communication unit 20 .
- step 3 j the authentication discriminating unit 104 does not establish the logic link since the authentication has been failed.
- the authentication discriminating unit 104 makes display indicating the failure in authentication on the display unit 60 to notify the user of the failure in authentication, and terminates the processing.
- the Bluetooth-enabled device Dbt takes initiative in executing the authentication. Even in a case where the authentication is not executed at high security Level 3 since the Bluetooth-enabled device Dbt does not have the I/O ability to execute the user authentication using a PIN number, the user authentication is executed at the cellular telephone UE if the user authentication is necessary.
- step 3 c If the other device is a printer which does not comprise a display or a number input key, for example, Security Level 2 is set by the authentication executed with the initiative of the other device (printer), in step 3 c . However, it is discriminated in step 3 g that the user authentication is necessary since the other device is a printer or a printing service, and the user authentication is executed by employing user interfaces (operation unit 40 and display unit 60 ) of the cellular telephone UE in step 3 h , and permission for execution of the service is obtained from the user.
- the user authentication is executed at the cellular telephone UE. Therefore, the high security level can be set, and the connectivity is not damaged while maintaining a necessary security level.
- the information items (device information and ability information) of the other device are obtained on the basis of the FHS packet in step 3 b .
- the information items may be obtained on the basis of, for example, EIR (Extended Inquiry Response) packet.
- EIR Extended Inquiry Response
- the type of service (type of application software) selected by the user by means of the operation unit 40 may be used as the information indicating the type of the service used in step 3 g .
- the security level setting unit 105 may discriminate the security level on the basis of types of the action and the service to be activated.
- Bluetooth is built in various types of devices and often cannot use the authentication system accompanying the user confirmation.
- cellular telephones render services requiring high security such as speech communications and data communications by Bluetooth
- the other devices at the time of employing speech communications are devices which comprise operation inputting means and displays such as car navigators and devices which do not comprise operation inputting means or displays such as headsets.
- the authentication system accompanying the user confirmation cannot be employed.
- a radio communication terminal is described as an example of a cellular telephone.
- the present invention is not limited to a cellular telephone, but can also be applied to a device (for example, a car navigation device, PC, etc.) which has a near field communication function and which is based on executing authentication at the time of establishing the connection of the near field communication.
- FIG. 10 is a block diagram showing a configuration of a cellular telephone according to the embodiment of the present invention.
- a cellular telephone 1 comprises a control unit 51 , an operation unit 52 , a display unit 53 , a speech input/output unit 54 , a radio telephone communication unit 55 , a storage unit 56 , and a near field communication unit 57 .
- the control unit 51 comprises CPU, ROM, RAM, etc. and executes control of the entire cellular telephone 1 .
- the operation unit 52 comprises operation keys or a touchpad, a touch panel, etc. and inputs signals responding to user operations to the control unit 51 .
- the display unit 53 is constituted by a liquid crystal display, organic EL display, etc. to display letters and characters, and images under control of the control unit 51 .
- the speech input/output unit 54 comprises a speaker and a microphone, and executes input and output of speech transmitted over communication by the radio telephone communication unit 55 and output of speech and music such as music content and moving image content, etc.
- the radio telephone communication unit 55 executes speech communication and packet communication via the base station. For example, if speech is transmitted by the speech communication, the radio telephone communication unit 55 executes signal processing such as coding, error control, etc. for the speech data obtained by collecting the speech from the microphone of the speech input/output unit 54 , and transmits the data obtained by the processing to the base station over a radio signal. In addition, the radio telephone communication unit 55 receives the radio signal from the base station and converts the radio signal into an electric signal. Then, the radio telephone communication unit 55 executes signal processing such as decoding, error correction, etc. for the electric signal, and outputs a speech signal thereby obtained from the speaker of the speech input/output unit 54 .
- signal processing such as coding, error control, etc. for the speech data obtained by collecting the speech from the microphone of the speech input/output unit 54 , and transmits the data obtained by the processing to the base station over a radio signal.
- the radio telephone communication unit 55 receives the radio signal from the base station and converts the radio signal into
- the storage unit 56 stores various types of application software, information registered by the user, etc.
- the near field communication unit 57 is constituted by a radio communication module which transmits and receives a radio signal of smaller transmission power than the radio telephone communication unit 55 , such as Bluetooth, and executes radio communication with the other device.
- a radio communication module which transmits and receives a radio signal of smaller transmission power than the radio telephone communication unit 55 , such as Bluetooth, and executes radio communication with the other device.
- the following descriptions exemplify a case where the near field communication unit 57 executes Bluetooth connection.
- the control unit 51 comprises a protocol control unit 81 , a protocol controlling unit 82 , an authentication controlling unit 83 , an authentication discriminating unit 84 , a security level discriminating unit 85 , a device registration controlling unit 86 , and a near field communication controlling unit 87 .
- the protocol control unit 81 controls a communication protocol to transmit the data in the near field communication.
- the protocol control unit 81 executes a function provided by Bluetooth Stack from Baseband to RFCOMM.
- the protocol controlling unit 82 executes a defined procedure for each of services (profiles) in Bluetooth.
- the profiles are, for example, HFP (Hands-Free Profile) for implementing hands-free conversation, A2DP (Advanced Audio Distribution Profile) for transmitting speech, AVRCP (Audio/Video Remote Control Profile) for implementing a remote-controller function, etc.
- the authentication controlling unit 83 executes authentication by using a public key, a device address, and a key calculated from the time information.
- the authentication procedures are defined under Bluetooth Core Spec such as Bluetooth Stack and Generic Access Profile.
- the authentication discriminating unit 84 determines an authentication scheme from the security level which is set for the input display ability of the other device and each of the services (profiles), and executes the authentication procedures of the authentication controlling unit 83 in the determined authentication scheme.
- the security level discriminating unit 85 maintains the security level set for each of the services (profiles). Then, in response to the inquiry from the authentication discriminating unit 84 , the security level discriminating unit 85 notifies the authentication discriminating unit 84 of the security level which should be set for each of the services.
- the security levels maintained by the security level discriminating unit 85 include Security Level 2 and Security Level 3.
- Security Level 2 is a security level at which authentication can be executed in the authentication scheme not accommodating the user confirmation.
- Security Level 3 is a security level at which authentication is necessary in the authentication scheme accommodating the user confirmation.
- the security level is set at “3”.
- OPP Object Push Profile
- the security level may be set at “2” for such a profile not requiring the high security.
- the device registration controlling unit 86 creates a link key for authentication with the other device and maintains the created link key in association with the device address.
- the near field communication controlling unit 87 controls a baseband of near field communication executed by the near field communication unit 57 .
- FIG. 11 is a flowchart showing processing in a case where the cellular telephone 1 receives a connection request.
- connection request is presumed as a connection request for the service which requires the authentication scheme of Security Level 3.
- the authentication controlling unit 83 obtains the input/output ability of the other device (S 102 ).
- the input/output ability of the other device is classified into ability in a case where displaying cannot be executed and inputting the numbers, Yes/No, etc. cannot be executed (hereinafter called I/O ability 1 ) and ability in the other case (hereinafter called I/O ability 2 ). If the other device has I/O ability 1 , the cellular telephone 1 cannot correspond to the authentication scheme accompanying the user confirmation since the displaying or inputting cannot be executed. In other words, the cellular telephone 1 cannot correspond to Security Level 3.
- the authentication discriminating unit 84 discriminates whether the other device can correspond to Security Level 3 or not, in accordance with the input/output ability of the other device obtained in step S 102 (S 103 ). If the authentication discriminating unit 84 discriminates that the other device can correspond to Security Level 3 (Yes in S 103 ), the authentication discriminating unit 84 determines the security level of the authentication at “3” and directs Security Level 3 to the security level discriminating unit 85 . The security level discriminating unit 85 creates a link key of Security Level 3 in response to the determined security level, and executes the authentication using the link key (S 104 ).
- the authentication discriminating unit 84 discriminates in step S 103 that the other device cannot correspond to Security Level 3 (No in S 103 ). If the authentication discriminating unit 84 discriminates whether the other device has been registered or not (S 106 ). If the other device has been registered, the device registration controlling unit 86 maintains the link key in association with the device address of the other device. Thus, the security level discriminating unit 85 executes the authentication by using the maintained link key (S 107 ).
- the authentication discriminating unit 84 discriminates the authentication scheme by using the information of the input display ability of the other device and the information as to whether the other device is an authenticated device or not. If the other device cannot correspond to Security Level 3 or is not an authenticated device, the security is maintained by rejecting the connection with the other device. If the other device can correspond to Security Level 3 and is an authenticated device, connection with the other device having I/O ability 1 at which displaying or inputting cannot be executed can also be implemented as much as possible by executing the authentication to make the connection possible.
- step S 103 it is discriminated in step S 103 whether the other device can correspond to Security Level 3 or not and, if the other device cannot correspond to Security Level 3, it is discriminated in step S 106 whether the other device has been authenticated or not.
- step S 103 and step S 106 may be opposite.
- FIG. 12 is a flowchart showing processing in a case where step S 106 is executed prior to step S 103 .
- the authentication discriminating unit 84 first executes the discrimination of step S 106 and, executes the authentication using the link key maintained by the authentication controlling unit 83 if the other device is an authenticated device, or discriminates whether the other device can correspond to Security Level 3 or not if the other device is not an authenticated device, and the authentication controlling unit 83 creates the link key of Security Level 3 to execute the authentication if the other device can correspond to Security Level 3.
- FIG. 13 is a flowchart showing processing in a case where the cellular telephone 1 makes a request for connection to an arbitrary other device.
- the connection request is presumed as a connection request for a service which can be authenticated in the authentication scheme at Security Level 2. If the authentication discriminating unit 84 discriminates that the connection request accompanying the authentication at Security Level 2 is made, the authentication discriminating unit 84 reads the authenticated devices stored in the device registration controlling unit 86 .
- the display unit 53 displays a list of the authenticated devices (S 202 ). The list of the authenticated devices is displayed as shown in, for example, FIG. 14 . In FIG.
- the authentication discriminating unit 84 makes the request for connection to the selected other device (S 203 ).
- the authentication discriminating unit 84 executes the authentication for establishment of connection by using the link key stored in the device registration controlling unit 86 (step S 204 ).
- the request for connection to the only authenticated device is made. If the authentication is executed in the authentication scheme not accompanying the user confirmation without user's selection of the device to which the request for connection is made, the user's confirmation operation is not executed during the process of authentication and the user would connect to a device to which the user does not intend to connect. In the processing shown in FIG. 13 , however, connection to device which the user does not intend can be avoided by urging the user to select the device to which the user intends to make a request for connection. Furthermore, in the processing shown in FIG. 13 , since the only authenticated device is displayed on the display unit 53 as the device to be selected, possibility of connecting to the device which the user does not intend due to the user's operation error can be reduced upon connecting to the other device by the authentication of a low security level.
- the authentication scheme can be simplified as much as possible while maintaining the security upon making the request for connection or receiving the request for connection.
- the present invention is not limited to the embodiments described above but the constituent elements of the invention can be modified in various manners without departing from the spirit and scope of the invention.
- Various aspects of the invention can also be extracted from any appropriate combination of a plurality of constituent elements disclosed in the embodiments. Some constituent elements may be deleted in all of the constituent elements disclosed in the embodiments. The constituent elements described in different embodiments may be combined arbitrarily.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (8)
Applications Claiming Priority (6)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2009-141507 | 2009-06-12 | ||
| JP2009141507A JP5369920B2 (en) | 2009-06-12 | 2009-06-12 | Wireless communication apparatus and wireless communication method |
| JP2009-141508 | 2009-06-12 | ||
| JP2009141508A JP5332928B2 (en) | 2009-06-12 | 2009-06-12 | Wireless communication apparatus and wireless communication method |
| JP2009-142423 | 2009-06-15 | ||
| JP2009142423A JP5321266B2 (en) | 2009-06-15 | 2009-06-15 | Wireless communication terminal |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| US20100319055A1 US20100319055A1 (en) | 2010-12-16 |
| US8775801B2 true US8775801B2 (en) | 2014-07-08 |
Family
ID=43307580
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US12/726,494 Expired - Fee Related US8775801B2 (en) | 2009-06-12 | 2010-03-18 | Radio communication apparatus and radio communication method |
Country Status (1)
| Country | Link |
|---|---|
| US (1) | US8775801B2 (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20130111555A1 (en) * | 2011-10-27 | 2013-05-02 | Stmicroelectronics Asia Pacific Pte Ltd. | System and method for security using a sibling smart card |
Families Citing this family (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR20110093295A (en) * | 2010-02-12 | 2011-08-18 | 삼성전자주식회사 | Method and apparatus for adaptive use of mobile phone in mobile terminal |
| US8929817B2 (en) * | 2011-05-13 | 2015-01-06 | Nokia Corporation | Sensor-based touch inquiry control |
| US8965285B2 (en) * | 2011-05-13 | 2015-02-24 | Nokia Corporation | Touch inquiry |
| US8929816B2 (en) * | 2011-05-13 | 2015-01-06 | Nokia Corporation | Multiple apparatus selection via touch |
| US20120314865A1 (en) * | 2011-06-07 | 2012-12-13 | Broadcom Corporation | NFC Communications Device for Setting Up Encrypted Email Communication |
| JP5762984B2 (en) * | 2012-01-10 | 2015-08-12 | 株式会社東芝 | Data transceiver |
| JP5834034B2 (en) * | 2013-02-25 | 2015-12-16 | 株式会社東芝 | Wireless communication device |
| JP6127996B2 (en) * | 2014-01-31 | 2017-05-17 | 株式会社Jvcケンウッド | Terminal device, management device, communication system, program, communication method |
| US9693232B2 (en) * | 2014-02-20 | 2017-06-27 | Aselsan Elektronik Sanayi Ve Ticaret Anonim Sirketi | High security system and method used in radio systems |
| CN108604269A (en) * | 2015-07-28 | 2018-09-28 | 李泰玩 | For the device and method of certification, and it is applied to identical computer program and recording medium |
| EP3144798B1 (en) * | 2015-09-18 | 2020-12-16 | Canon Kabushiki Kaisha | Image processing apparatus, method of controlling the same, and storage medium |
| WO2018004303A1 (en) * | 2016-07-01 | 2018-01-04 | 엘지전자(주) | Authentication method and system for device using bluetooth technology |
Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2003085528A1 (en) | 2002-04-11 | 2003-10-16 | International Business Machines Corporation | Computer, computer security setting method, and program |
| JP2005318298A (en) | 2004-04-28 | 2005-11-10 | Ntt Docomo Inc | Mobile device and communication control method |
| JP2006191569A (en) | 2004-12-17 | 2006-07-20 | Samsung Electronics Co Ltd | Bluetooth device and method for providing a service determined by a Bluetooth PIN |
| JP2007068035A (en) | 2005-09-01 | 2007-03-15 | Toshiba Corp | Information processing apparatus and control method thereof |
| US7269260B2 (en) * | 2001-12-26 | 2007-09-11 | Kabushiki Kaisha Toshiba | Communication system, wireless communication apparatus, and communication method |
| US7356308B2 (en) * | 2002-06-07 | 2008-04-08 | Sony Corporation | Radio communication apparatus and radio communication method, radio communication system, recording medium, and computer program |
| JP2009060526A (en) | 2007-09-03 | 2009-03-19 | Ntt Docomo Inc | Communication device, communication system, and communication connection method |
-
2010
- 2010-03-18 US US12/726,494 patent/US8775801B2/en not_active Expired - Fee Related
Patent Citations (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7269260B2 (en) * | 2001-12-26 | 2007-09-11 | Kabushiki Kaisha Toshiba | Communication system, wireless communication apparatus, and communication method |
| WO2003085528A1 (en) | 2002-04-11 | 2003-10-16 | International Business Machines Corporation | Computer, computer security setting method, and program |
| US20060090200A1 (en) | 2002-04-11 | 2006-04-27 | International Business Machines Corp | Computer, computer security setting method, and program |
| US7356308B2 (en) * | 2002-06-07 | 2008-04-08 | Sony Corporation | Radio communication apparatus and radio communication method, radio communication system, recording medium, and computer program |
| JP2005318298A (en) | 2004-04-28 | 2005-11-10 | Ntt Docomo Inc | Mobile device and communication control method |
| US7716475B2 (en) | 2004-04-28 | 2010-05-11 | Ntt Docomo, Inc. | Mobile station and communication control method |
| JP2006191569A (en) | 2004-12-17 | 2006-07-20 | Samsung Electronics Co Ltd | Bluetooth device and method for providing a service determined by a Bluetooth PIN |
| US7689169B2 (en) | 2004-12-17 | 2010-03-30 | Samsung Electronics Co., Ltd. | Bluetooth device and method for providing service determined according to Bluetooth PIN |
| JP2007068035A (en) | 2005-09-01 | 2007-03-15 | Toshiba Corp | Information processing apparatus and control method thereof |
| JP2009060526A (en) | 2007-09-03 | 2009-03-19 | Ntt Docomo Inc | Communication device, communication system, and communication connection method |
Non-Patent Citations (5)
| Title |
|---|
| Bluetooth Specification Version 2.0 & EDR: Bluetooth SIG; Nov. 4, 2004. |
| Bluetooth Specification Version 2.1 & EDR; Bluetooth SIG; Jul. 26, 2007. |
| JP Office Action dated Apr. 23, 2013 in application No. 2009-141508. |
| JP Office Action mailed on Mar. 12, 2013 in application No. 2009-141507. |
| JP Office Action mailed on Oct. 16, 2012 in application No. 2009-142423. |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20130111555A1 (en) * | 2011-10-27 | 2013-05-02 | Stmicroelectronics Asia Pacific Pte Ltd. | System and method for security using a sibling smart card |
| US9021557B2 (en) * | 2011-10-27 | 2015-04-28 | Stmicroelectronics Pte Ltd | System and method for security using a sibling smart card |
Also Published As
| Publication number | Publication date |
|---|---|
| US20100319055A1 (en) | 2010-12-16 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US8775801B2 (en) | Radio communication apparatus and radio communication method | |
| JP5980496B2 (en) | Access point connection apparatus and method for portable terminal | |
| US20110177780A1 (en) | Wireless communication apparatus | |
| US8620217B2 (en) | Short range wireless communication apparatus | |
| JP5505412B2 (en) | Information processing apparatus, external device expansion system, external device expansion method, external device expansion program, and program recording medium | |
| CN104301857A (en) | Method and device for wireless communication between communication terminals | |
| CN101068196B (en) | A service access control method for bluetooth mobile phone access to bluetooth gateway | |
| US20100112988A1 (en) | Wireless communication terminal and method for wireless communication | |
| KR20160143333A (en) | Method for Double Certification by using Double Channel | |
| KR20140128764A (en) | Method for connectivity information control and an electronic device thereof | |
| CN105208529A (en) | A location prompting method and a location prompting module of a mobile terminal | |
| US20060258391A1 (en) | Mobile communications terminal and communication method thereof | |
| JP5369920B2 (en) | Wireless communication apparatus and wireless communication method | |
| US20100112994A1 (en) | Hands-free device | |
| JP5332928B2 (en) | Wireless communication apparatus and wireless communication method | |
| JP2008017083A (en) | Remote control system, remote control method, and remote operating program | |
| KR20230153339A (en) | System providing recorded information, method thereof and non-transitory computer readable medium having computer program recorded thereon | |
| JP5321266B2 (en) | Wireless communication terminal | |
| KR101106695B1 (en) | Method for managing a mobile terminal with a message | |
| CN100581203C (en) | A method for modifying the bluetooth password of the bluetooth wireless voice gateway | |
| JP5516207B2 (en) | Communications system | |
| JP4276251B2 (en) | Mobile communication terminal and mobile communication terminal control method. | |
| KR100660464B1 (en) | How to connect a Bluetooth device from your mobile device | |
| KR20070060182A (en) | Message transmission service method and apparatus with encryption function | |
| KR20060028275A (en) | Mobile communication terminal equipped with unlocking function using external mobile communication network and its control method |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: KABUSHIKI KAISHA TOSHIBA, JAPAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:TAMURA, TOSHIYA;TERABE, SHIGEO;SIGNING DATES FROM 20100312 TO 20100501;REEL/FRAME:024405/0950 |
|
| AS | Assignment |
Owner name: FUJITSU TOSHIBA MOBILE COMMUNICATIONS LIMITED, JAPAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:KABUSHIKI KAISHA TOSHIBA;REEL/FRAME:025433/0713 Effective date: 20101014 Owner name: FUJITSU TOSHIBA MOBILE COMMUNICATIONS LIMITED, JAP Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:KABUSHIKI KAISHA TOSHIBA;REEL/FRAME:025433/0713 Effective date: 20101014 |
|
| AS | Assignment |
Owner name: FUJITSU MOBILE COMMUNICATIONS LIMITED, JAPAN Free format text: CHANGE OF NAME;ASSIGNOR:FUJITSU TOSHIBA MOBILE COMMUNICATIONS LIMITED;REEL/FRAME:029645/0103 Effective date: 20121127 |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
| MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551) Year of fee payment: 4 |
|
| AS | Assignment |
Owner name: FUJITSU CONNECTED TECHNOLOGIES LIMITED, JAPAN Free format text: MERGER;ASSIGNOR:FUJITSU MOBILE COMMUNICATIONS LIMITED;REEL/FRAME:048302/0419 Effective date: 20181001 |
|
| FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
| LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
| STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
| FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20220708 |